Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Cloud Security via Asynchronous Virtual Machine Introspection., , , , , and . HotCloud, USENIX Association, (2016)Human-Machine Collaborative Optimization via Apprenticeship Scheduling., , , , , , and . CoRR, (2018)Robotic assistance in the coordination of patient care., , , , , , , , , and . I. J. Robotics Res., (2018)Robotic Assistance in Coordination of Patient Care., , , , , , , , , and . Robotics: Science and Systems, (2016)A Multi-Plane Block-Coordinate Frank-Wolfe Algorithm for Structural SVMs with a Costly max-Oracle., , and . CoRR, (2014)OpenNetVM: A Platform for High Performance Network Service Chains., , , , , , , and . HotMiddlebox@SIGCOMM, page 26-31. ACM, (2016)Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs)., , , , and . HASP@ISCA, page 10:1-10:8. ACM, (2014)A multi-plane block-coordinate frank-wolfe algorithm for training structural SVMs with a costly max-oracle., , and . CVPR, page 2737-2745. IEEE Computer Society, (2015)CRIMES: Using Evidence to Secure the Cloud., , , , , and . Middleware, page 40-52. ACM, (2018)OpenNetVM: Flexible, high performance NFV (Demo)., , , , , , , and . NetSoft, page 359-360. IEEE, (2016)